The capture of data by a hospital’s data security system that shows multiple invalid attempts to access the patients’ database is an example of __________.
The HIPAA security rule contains what provision about encryp…
The HIPAA security rule contains what provision about encryption?
The HIPAA security rule requires that the covered entity____…
The HIPAA security rule requires that the covered entity___________.
All of the following are security rule physical safeguard st…
All of the following are security rule physical safeguard standards except___________.
The federal physician self-referral statute is also known as…
The federal physician self-referral statute is also known as the _________.
Copying data onto tapes and storing the tapes at a distant l…
Copying data onto tapes and storing the tapes at a distant location is an example of___________.
Security awareness training programs require the implementat…
Security awareness training programs require the implementation of awareness and training of all workforce members and should include___________.
Augusta Clinic has requested that Furr Hospital send its hea…
Augusta Clinic has requested that Furr Hospital send its health records from Helena Smith’s most recent admission to the clinic for her follow-up appointment. Which of the following statements is true?
Jack Mitchell, a patient in Ross Hospital, is being treated…
Jack Mitchell, a patient in Ross Hospital, is being treated for gallstones. He has not opted out of the facility directory. Callers who request information about him may be given __________.
Which of the following would be the best tool to determine w…
Which of the following would be the best tool to determine whether or not access to ePHI was appropriate?